US20100080123A1 - Method and Apparatus for Signaling Proprietary Information Between Network Elements of a Core Network in a Wireless Communication Network - Google Patents

Method and Apparatus for Signaling Proprietary Information Between Network Elements of a Core Network in a Wireless Communication Network Download PDF

Info

Publication number
US20100080123A1
US20100080123A1 US12/241,244 US24124408A US2010080123A1 US 20100080123 A1 US20100080123 A1 US 20100080123A1 US 24124408 A US24124408 A US 24124408A US 2010080123 A1 US2010080123 A1 US 2010080123A1
Authority
US
United States
Prior art keywords
node
ran
packet
proprietary information
mobility
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/241,244
Other versions
US8503432B2 (en
Inventor
Colin Kahn
Philip Lamoureux
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alcatel Lucent SAS
Original Assignee
Alcatel Lucent USA Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alcatel Lucent USA Inc filed Critical Alcatel Lucent USA Inc
Priority to US12/241,244 priority Critical patent/US8503432B2/en
Assigned to LUCENT TECHNOLOGIES INC. reassignment LUCENT TECHNOLOGIES INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KAHN, COLIN, LAMOUREUX, PHILIP
Publication of US20100080123A1 publication Critical patent/US20100080123A1/en
Assigned to CREDIT SUISSE AG reassignment CREDIT SUISSE AG SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALCATEL-LUCENT USA INC.
Assigned to ALCATEL-LUCENT USA INC. reassignment ALCATEL-LUCENT USA INC. MERGER (SEE DOCUMENT FOR DETAILS). Assignors: LUCENT TECHNOLOGIES INC.
Assigned to ALCATEL LUCENT reassignment ALCATEL LUCENT ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALCATEL-LUCENT USA INC.
Application granted granted Critical
Publication of US8503432B2 publication Critical patent/US8503432B2/en
Assigned to ALCATEL-LUCENT USA INC. reassignment ALCATEL-LUCENT USA INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: CREDIT SUISSE AG
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation
    • H04W80/04Network layer protocols, e.g. mobile IP [Internet Protocol]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields

Definitions

  • the invention relates to the field of communication networks and, more specifically, to propagating information within a core network serving a radio access network (RAN) in a wireless communication network.
  • RAN radio access network
  • CN core network
  • a method for signaling proprietary information within a core network (CN) of a wireless communication network includes encoding the proprietary information in an IPv4 Options field of an inner header of an IP packet, and pre-pending an outer header to the IP packet for Mobile IPv4 (MIPv4) tunneling the IP packet from a mobility anchor node of the CN toward a mobility gateway node of the CN.
  • MIPv4 Mobile IPv4
  • a method for signaling proprietary information within a wireless communication network having a core network (CN) and a radio access network (RAN) includes receiving an IP packet (including an outer header, an inner header, and a payload) at a mobility gateway node operating as a gateway from the CN to the RAN, removing the outer header from the IP packet, stripping an IPv4 Options field from the inner header of the IP packet where the IPv4 Options field includes the proprietary information, and propagating the proprietary information from the mobility gateway node of the CN toward a control node of the RAN.
  • IP packet including an outer header, an inner header, and a payload
  • a method for signaling proprietary information within a core network (CN) of a wireless communication network includes encoding the proprietary information in an IPv4 Options field of an inner header of an IP packet, and pre-pending an outer header to the IP packet for Mobile IPv4 (MIPv4) tunneling of the IP packet from a mobility gateway node of the CN toward a mobility anchor node of the CN.
  • MIPv4 Mobile IPv4
  • a method for signaling proprietary information within a wireless communication network having a core network (CN) and a radio access network (RAN) includes receiving an IP packet (including an outer header, an inner header, and a payload) at a mobility anchor node of the CN, removing the outer header from the IP packet, stripping an IPv4 Options field from the inner header of the IP packet where the IPv4 Options field includes the proprietary information, and performing at least one of performing a control function within the CN using the proprietary information and propagating the proprietary information toward at least one other node of the CN.
  • IP packet including an outer header, an inner header, and a payload
  • FIG. 1 depicts a high-level block diagram of a wireless communication network including a core network (CN) and a radio access network (RAN);
  • CN core network
  • RAN radio access network
  • FIG. 2 depicts the communication network of FIG. 1 illustrating a method for propagating proprietary information using forward tunneling in a direction from the CN toward the RAN;
  • FIG. 3 depicts the communication network of FIG. 1 illustrating a method for propagating proprietary information using reverse tunneling in a direction from the RAN toward the CN;
  • FIG. 4 depicts a high-level block diagram of a general-purpose computer suitable for use in performing the functions described herein.
  • the proprietary information signaling functions depicted and described herein enable proprietary information to be conveyed between nodes of a core network (CN) that is serving a radio access network (RAN) in a wireless communication network.
  • the proprietary information signaling functions depicted and described herein enable proprietary information to be conveyed from the CN to the RAN for use by the RAN in performing control functions within the RAN.
  • the proprietary information signaling functions depicted and described herein enable proprietary information to be conveyed from the RAN to the CN for use by the CN in performing control functions within the CN.
  • the proprietary information signaling functions are provided on a per-packet basis, thereby providing a per-packet, and, thus, per-flow, signaling channel between the CN and RAN.
  • FIG. 1 depicts a high-level block diagram of a wireless communication network including a core network (CN) and a radio access network (RAN).
  • wireless communication network 100 includes an IP network 110 , a core network (CN) 120 , and a radio access network (RAN) 130 .
  • the IP network 110 facilitates communications for a plurality of correspondent nodes (CONs) 101 .
  • the IP network 110 communicates with CN 120 .
  • the RAN 130 facilitates communications for a plurality of mobile nodes (MNs) 199 .
  • MNs mobile nodes
  • the RAN 130 communicates with CN 120 .
  • the CN 120 facilitates communications between IP network 110 and RAN 130 and, thus, between CONs 101 and MNs 199 .
  • the IP network 110 may include any IP network or combination of interconnected IP networks, such as one or more Intranets, the Internet, and the like, as well as various combinations thereof. Although represented as an IP network, IP network 110 may encompass various other types of packet networks.
  • the CN 120 is a core network. As depicted in FIG. 1 , CN 120 includes a mobility anchor node 121 and a mobility gateway node 122 .
  • the mobility anchor node 121 operates as a mobility anchor.
  • the mobility anchor node 121 operates as a gateway between CN 120 and IP network 110 .
  • the mobility gateway node 122 operates as a gateway between CN 120 and RAN 130 .
  • the CN 120 includes various other network elements adapted for providing various other functions, services, and the like (each of which is omitted for purposes of clarity).
  • the RAN 130 is a radio access network, providing an air interface for mobile nodes.
  • the RAN 130 may include a control node and a radio access node, as well as various other nodes which may be deployed within different types of RANs (each of which is omitted for purposes of clarity).
  • the IP network 110 , CN 120 , and RAN 130 facilitate communications between CONs 101 and MNs 199 .
  • the CONs 101 include nodes with which MNs 199 may communicate.
  • the CONs 101 may be stationary and/or mobile.
  • CONs 101 may include phones (e.g., wired VoIP phones, wireless mobile phones, and the like), servers, and the like.
  • the CONs 101 may include Disney servers providing Disney content, CBS News servers providing CBS News content, or any other servers adapted for serving MNs 199 .
  • CONs 101 may include any nodes with which MNs 199 may communicate to exchange information.
  • the MNs 199 include wireless nodes which have wireless network connectivity via RAN 130 .
  • MNs 199 may include nodes such as cell phones, personal digital assistants (PDAs), computers, and the like.
  • CONs 101 and MNs 199 are merely for illustrative purposes and, therefore, the proprietary information signaling functions depicted and described herein are not intended to be limited by such examples.
  • the wireless communication network 100 may be implemented using any wireless communication network technologies.
  • the wireless communication network 100 may be implemented using one or more of a Universal Mobile Telecommunication System (UMTS)-based wireless network, a Code Division Multiple Access (CDMA)-based wireless network, a Worldwide Interoperability for Microwave Access (WiMAX)-based wireless network, and the like.
  • UMTS Universal Mobile Telecommunication System
  • CDMA Code Division Multiple Access
  • WiMAX Worldwide Interoperability for Microwave Access
  • the network elements deployed within CN 120 and RAN 130 vary depending on the type of wireless communication network employed.
  • mobility anchor node 121 may be implemented as a Packet Data Network (PDN)-Gateway (PDN-GW) and mobility gateway node 122 may be implemented as a Serving-Gateway (S-GW).
  • PDN Packet Data Network
  • S-GW Serving-Gateway
  • mobility anchor node 121 may be implemented as a Home Agent (HA) and mobility gateway node 122 may be implemented as a Packet Data Serving Node (PDSN).
  • HA Home Agent
  • PDSN Packet Data Serving Node
  • the control node is a Radio Network Controller (RNC) and the radio access node is a Node B.
  • RNC Radio Network Controller
  • the radio access node is an eNode-B.
  • the control node is a Radio Network Controller (RNC) and the radio access node is a base transceiver station (BTS).
  • RNC Radio Network Controller
  • BTS base transceiver station
  • the control node is an Access Service Network-Gateway (ASN-GW) and the radio access node is a base station (BS).
  • ASN-GW Access Service Network-Gateway
  • BS base station
  • the CN 120 supports propagation of proprietary information within CN 120 .
  • the CN 120 supports propagation of proprietary information within CN 120 from the mobility anchor node 121 to the mobility gateway node 122 .
  • the mobility gateway node 122 may then signal the proprietary information to RAN 130 for use by one or more nodes of the RAN 130 in performing one or more control functions within RAN 130 .
  • the CN 120 supports propagation of proprietary information within CN 120 from the mobility gateway node 122 to the mobility anchor node 121 .
  • the CN 120 may then use the proprietary information in performing one or more control functions within CN 120 .
  • the propagation of proprietary information within CN 120 for a given IP packet is performed by tunneling IP packets within CN 120 using Mobile IPv4 (MIPv4) tunneling.
  • An IP packet that is tunneled using MIPv4 tunneling includes a payload, an inner IP packet header, and an outer IP packet header.
  • the inner IP packet header propagates the proprietary information using one or more IPv4 Options fields which are added to the inner IP packet header at the source node endpoint of the MIPv4 tunnel and removed from the inner IP packet header at the destination node endpoint of the MIPv4 tunnel.
  • the inner IP packet header and payload form a payload for an outer IP packet header.
  • the outer IP packet header is used to route the IP packet between the endpoints of the MIPv4 tunnel, such that the inner IP packet header remains transparent to all of the intermediate nodes between the endpoints of the MIPv4 tunnel.
  • IPv4 Options fields are propagated within CN 120 using one or more IPv4 Options fields.
  • an IP packet may include zero or more IPv4 Options fields, which makes the total length of the IPv4 Options field in an IP packet header of the IP packet variable.
  • the IPv4 Options field(s) which may be included within the header of an IP packet is standardized in RFC 791, which is incorporated herein by reference in its entirety.
  • the IPv4 Options field(s) is typically used to support functions such as source routing, trace route recording, router time stamping, and military security classification and, thus, cannot be used for other signaling purposes.
  • forward tunneling i.e., from mobility anchor node 121 to mobility gateway node 122 in the direction toward the RAN 130
  • reverse tunneling i.e., from the mobility gateway node 122 to the mobility anchor node 121 in the direction from the RAN 130
  • both use an outer IP packet header which is pre-pended to each IP packet being tunneled, thereby rendering the inner IP packet header of each IP packet (which is essentially transported as part of the payload within the tunnel) transparent to intermediate nodes of the tunnel.
  • the mobility anchor node 121 may add one or more IPv4 Options fields to the inner IP packet header in order to communicate proprietary information with the CN 120 for delivery to the RAN 130 ; and for reverse tunneling the mobility gateway node 122 may add one or more IPv4 Options fields to the inner IP packet header in order to communicate proprietary information, received from the RAN 130 , to one or more nodes within the CN 120 .
  • wireless communication network 100 supports forward communication paths from CONs 101 toward MNs 199 and supports reverse communication paths from MNs 199 toward CONs 101 .
  • the forward communication paths utilize forward tunneling in the CN 120 (i.e., tunneling from mobility anchor node 121 to mobility gateway node 122 ) for propagating proprietary information from CN 120 toward RAN 120 , which may be better understood with respect to FIG. 2 .
  • the reverse communication paths utilize reverse tunneling in the CN 120 (i.e., tunneling from mobility gateway node 122 to mobility anchor node 121 ) for propagating proprietary information from RAN 130 within CN 120 , which may be better understood with respect to FIG. 3 .
  • FIG. 2 depicts the communication network of FIG. 1 illustrating a method for propagating proprietary information using forward tunneling in a direction from the CN 120 toward the RAN 130 .
  • the mobility anchor node 121 receives an IP packet (which may also be referred to as an original IP packet).
  • the mobility anchor node 121 receives the IP packet from the IP network 110 (e.g., where the IP packet is part of a packet flow from one of the CONs 101 toward one or more of the MNs 199 ).
  • the received IP packet includes a payload and a header (which is referred to herein as an inner header).
  • the mobility anchor node 121 encodes proprietary information in one or more IPv4 Options fields which are added to the inner header of the IP packet received at the mobility anchor node 121 to form a modified IP packet.
  • the proprietary information may include any information which may be used for performing control functions within RAN 130 .
  • proprietary information associated with an IP packet of an IP flow may specify information such as the type of application of the IP flow (e.g., e-mail, voice over IP, streaming video, and the like), the specific application of the IP flow (e.g., YouTube, Skype, Slingbox, and the like), the content provider that is the source of the content being conveyed by the IP flow (e.g., Disney, MSNBC, CNN, and the like), and the like, as well as various combinations thereof.
  • the type of application of the IP flow e.g., e-mail, voice over IP, streaming video, and the like
  • the specific application of the IP flow e.g., YouTube, Skype, Slingbox, and the like
  • the content provider that is the source of the content being conveyed by the IP flow e.g., Disney, MSNBC, CNN, and the like
  • the like as well as various combinations thereof.
  • proprietary information associated with an IP packet of an IP flow may specify one or more policies to be applied to the IP packet within the RAN 130 .
  • the policy(s) to be applied to the IP packet within RAN 130 may be determined using such higher-layer information (e.g., the type of application of the IP flow, specific application of the IP flow, content provider that is the source of the content being conveyed by the IP flow, and the like, as well as various combinations thereof).
  • the proprietary information may include any other information which may be used for performing control functions within RAN 130 .
  • the proprietary information may be determined by the mobility anchor node 121 by performing deep packet inspection on the payload of the received IP packet.
  • the proprietary information may be received at mobility anchor node 121 from one or more other nodes of CN 120 (not depicted).
  • the proprietary information may be determined, received, or otherwise obtained in various other ways.
  • the proprietary information may be encoded within the one or more IPv4 Options fields in any manner for encoding such information.
  • the mobility anchor node 121 prepends an outer header to the modified IP packet such that the inner header and payload of the modified IP packet together form a payload for the outer header.
  • the outer header identifies mobility anchor node 121 as the source node of the IP packet and mobility gateway node 122 as the destination node of the IP packet.
  • the IP packet including the original payload, the inner header, and the outer header is tunneled from the mobility anchor node 121 to the mobility gateway node 122 (and, thus, is referred to as a tunneled IP packet).
  • the mobility anchor node 121 propagates the tunneled IP packet to the mobility gateway node 122 .
  • the tunneled IP packet is tunneled from mobility anchor node 121 to mobility gateway node 122 using the information in the outer header of the tunneled IP packet.
  • the proprietary information is tunneled from mobility anchor node 121 to mobility gateway node 122 without the proprietary information being processed by any intermediate nodes along the path between mobility anchor node 121 and mobility gateway node 122 .
  • the mobility gateway node 122 receives the tunneled IP packet from mobility anchor node 121 .
  • the mobility gateway node 122 removes the outer header from the tunneled IP packet.
  • the mobility gateway node 122 strips any IPv4 Options fields from the inner header of the IP packet, thereby returning the modified IP packet to its original form (i.e., to the format of the IP packet originally received by mobility anchor node 121 ).
  • the mobility gateway node 122 recovers the proprietary information from the stripped IPv4 Options field(s).
  • the mobility gateway node 122 propagates the original IP packet to the RAN 130 for delivery to its intended destination (e.g., one of the MNs 199 ) via RAN 130 .
  • the mobility gateway node 122 may propagate the original IP packet to RAN 130 in any manner for propagating IP packets from CN 120 to RAN 130 .
  • the mobility gateway node 122 propagates the proprietary information toward RAN 130 .
  • the mobility gateway node 122 may propagate proprietary information toward RAN 130 in any manner for propagating such information from CN 120 to RAN 130 .
  • the proprietary information may be propagated to RAN 130 using one or more existing RAN protocols.
  • the RAN 130 receives the proprietary information.
  • the RAN 130 uses the proprietary information to perform one or more control functions within the RAN 130 .
  • the control function(s) which may be performed within the RAN 130 using proprietary information includes one or more of performing a network management operation, performing a quality-of-service control operation, performing a congestion control operation (e.g., applying flow control, applying overload control, and the like), and the like, as well as various combinations thereof.
  • RAN 130 may determine that IP packets of the IP flow are associated with a preferred application (e.g., CNN) and, thus, are to be given priority within RAN 130 over other packets of other IP flows not associated with preferred applications.
  • a preferred application e.g., CNN
  • RAN 130 may determine that IP packets of the IP flow are associated with a type of application requiring a certain air-interface bandwidth) in order to maintain an acceptable level of quality-of-service (e.g., a streaming video application) and, thus, are to be given priority over other IP flows conveying content for other types of applications.
  • quality-of-service e.g., a streaming video application
  • FIG. 3 depicts the communication network of FIG. 1 illustrating a method for propagating proprietary information using reverse tunneling in a direction from the RAN 130 toward the CN 120 .
  • the mobility gateway node 122 receives an IP packet (which may also be referred to as an original IP packet).
  • the mobility gateway node 122 receives the IP packet from the RAN 130 (e.g., where the IP packet is part of a packet flow from one of the MNs 199 toward one of the CONs 101 ).
  • the received IP packet includes a payload and a header (which is referred to herein as an inner header).
  • the mobility gateway node 122 encodes proprietary information in one or more IPv4 Options fields which are added to the inner header of the IP packet received at the mobility gateway node 122 to form a modified IP packet.
  • the proprietary information may include any information which may be used for performing control functions within CN 120 .
  • the proprietary information may specify information such as RAN congestion status. This status may be used by the CN to control the flow of data from the CN 120 to the RAN 130 .
  • the proprietary information may be used to specify flow admission control information to be used by the CN 120 to determine whether a new flow may be admitted to the network.
  • the proprietary information may be used to provide RAN capability information to the CN 120 to ensure compatibility between CN and RAN functions.
  • the proprietary information may be used within CN 120 in various other ways.
  • the proprietary information may be determined by the mobility gateway node 122 by performing deep packet inspection on the payload of the received IP packet.
  • the proprietary information may be received at mobility gateway node 122 from one or more other nodes of CN 120 and/or RAN 130 (not depicted).
  • the proprietary information may be determined, received, or otherwise obtained in various other ways.
  • the proprietary information may be encoded within the one or more IPv4 Options fields in any manner for encoding such information.
  • the mobility gateway node 122 prepends an outer header to the modified IP packet such that the inner header and payload of the modified IP packet together form a payload for the outer header.
  • the outer header identifies mobility gateway node 122 as the source node of the IP packet and mobility anchor node 121 as the destination node of the IP packet.
  • the IP packet including the original payload, the inner header, and the outer header is tunneled from the mobility gateway node 122 to the mobility anchor node 121 (and, thus, is referred to as a tunneled IP packet).
  • the mobility gateway node 122 propagates the tunneled IP packet to the mobility anchor node 121 .
  • the tunneled IP packet is tunneled from the mobility gateway node 122 to the mobility anchor node 121 using the information in the outer header of the tunneled IP packet.
  • the proprietary information is tunneled from mobility gateway node 122 to mobility anchor node 121 without the proprietary information being processed by any intermediate nodes along the path between mobility gateway node 122 and mobility anchor node 121 .
  • the mobility anchor node 121 receives the tunneled IP packet from mobility gateway node 122 .
  • the mobility anchor node 121 removes the outer header from the tunneled IP packet.
  • the mobility anchor node 121 strips any IPv4 Options fields from the inner header of the IP packet, thereby returning the modified IP packet to its original form (i.e., to the format of the IP packet originally received by mobility gateway node 122 ).
  • the mobility anchor node 121 recovers the proprietary information from the stripped IPv4 Options field(s).
  • the mobility anchor node 121 propagates the original IP packet toward its intended destination (e.g., one of the CONs 101 ) via IP network 110 .
  • the mobility anchor node 121 may propagate the original IP packet toward its intended destination in any manner for propagating IP packets within a packet network.
  • the mobility anchor node 121 may utilize the proprietary information to perform one or more control functions and/or may propagate the proprietary information toward one or more other nodes inside and/or outside of CN 120 for use in performing one or more control functions.
  • the mobility anchor node 121 may propagate the proprietary information within or outside of CN 120 in any manner adapted for propagating such information.
  • the CN 120 uses the proprietary information to perform one or more control functions within the CN 120 .
  • the control function(s) which may be performed within the CN 120 using proprietary information includes one or more of performing a network management operation, performing a quality-of-service control operation, performing a congestion control operation (e.g., applying flow control, applying overload control, and like congestion control operations), determining compatibility between CN and RAN functions using RAN capability information signaled into the CN from the RAN, and the like, as well as various combinations thereof.
  • proprietary information signaling functions depicted and described herein may be utilized for propagating proprietary information between the CN and RAN in networks that convey information using other types of packets.
  • proprietary information may be conveyed in the packets in any manner supported by the type of packet within which proprietary information is to be conveyed.
  • FIG. 4 depicts a high-level block diagram of a general-purpose computer suitable for use in performing the functions described herein.
  • system 400 comprises a processor element 402 (e.g., a CPU), a memory 404 , e.g., random access memory (RAM) and/or read only memory (ROM), a proprietary information signaling control module 405 , and various input/output devices 406 (e.g., storage devices, including but not limited to, a tape drive, a floppy drive, a hard disk drive or a compact disk drive, a receiver, a transmitter, a speaker, a display, an output port, and a user input device (such as a keyboard, a keypad, a mouse, and the like)).
  • processor element 402 e.g., a CPU
  • memory 404 e.g., random access memory (RAM) and/or read only memory (ROM), a proprietary information signaling control module 405
  • various input/output devices 406 e.g., storage
  • a proprietary information signaling control process 405 can be loaded into memory 404 and executed by processor 402 to implement the functions as discussed above.
  • proprietary information signaling control process 405 (including associated data structures) of the present invention can be stored on a computer readable medium or carrier, e.g., RAM memory, magnetic or optical drive or diskette, and the like.

Abstract

The invention includes a method and apparatus for signaling proprietary information between network elements of a core network (CN) of a wireless communication network. A method for signaling proprietary information within the CN includes encoding the proprietary information in an IPv4 Options field of an inner header of an IP packet, and pre-pending an outer header to the IP packet for Mobile IPv4 (MIPv4) tunneling the IP packet from a first node of the CN to a second node of the CN. The first and second nodes of the CN may include a mobility anchor node and a mobility gateway node, respectively. The first and second nodes of the CN may include a mobility gateway node and a mobility anchor node, respectively. A method for signaling proprietary information includes receiving a tunneled IP packet at a first node of the CN (where the IP packet includes an outer header, an inner header, and a payload), removing the outer header from the IP packet, stripping an IP Options field from the inner header of the IP packet where the IPv4 Options field includes the proprietary information, and propagating the proprietary information from the first node of the CN to a second node. The first node of the CN may be a mobility gateway node and the second node may be a node of a radio access network (RAN). The first node of the CN may be a mobility anchor node and the second node may be another node of the CN.

Description

    FIELD OF THE INVENTION
  • The invention relates to the field of communication networks and, more specifically, to propagating information within a core network serving a radio access network (RAN) in a wireless communication network.
  • BACKGROUND OF THE INVENTION
  • In existing Third Generation (3G) and Fourth Generation (4G) wireless communication networks, the signaling between network elements of the core network (CN) and network elements of the Radio Access Network (RAN) is highly standardized. Disadvantageously, such existing signaling capabilities limit the ability of service providers to communicate information within the CN and between the CN and the RAN.
  • SUMMARY OF THE INVENTION
  • Various deficiencies in the prior art are addressed through a method and apparatus for signaling proprietary information between network elements of a core network (CN) of a wireless communication network.
  • In one embodiment, a method for signaling proprietary information within a core network (CN) of a wireless communication network includes encoding the proprietary information in an IPv4 Options field of an inner header of an IP packet, and pre-pending an outer header to the IP packet for Mobile IPv4 (MIPv4) tunneling the IP packet from a mobility anchor node of the CN toward a mobility gateway node of the CN.
  • In one embodiment, a method for signaling proprietary information within a wireless communication network having a core network (CN) and a radio access network (RAN) includes receiving an IP packet (including an outer header, an inner header, and a payload) at a mobility gateway node operating as a gateway from the CN to the RAN, removing the outer header from the IP packet, stripping an IPv4 Options field from the inner header of the IP packet where the IPv4 Options field includes the proprietary information, and propagating the proprietary information from the mobility gateway node of the CN toward a control node of the RAN.
  • In one embodiment, a method for signaling proprietary information within a core network (CN) of a wireless communication network includes encoding the proprietary information in an IPv4 Options field of an inner header of an IP packet, and pre-pending an outer header to the IP packet for Mobile IPv4 (MIPv4) tunneling of the IP packet from a mobility gateway node of the CN toward a mobility anchor node of the CN.
  • In one embodiment, a method for signaling proprietary information within a wireless communication network having a core network (CN) and a radio access network (RAN) includes receiving an IP packet (including an outer header, an inner header, and a payload) at a mobility anchor node of the CN, removing the outer header from the IP packet, stripping an IPv4 Options field from the inner header of the IP packet where the IPv4 Options field includes the proprietary information, and performing at least one of performing a control function within the CN using the proprietary information and propagating the proprietary information toward at least one other node of the CN.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The teachings of the present invention can be readily understood by considering the following detailed description in conjunction with the accompanying drawings, in which:
  • FIG. 1 depicts a high-level block diagram of a wireless communication network including a core network (CN) and a radio access network (RAN);
  • FIG. 2 depicts the communication network of FIG. 1 illustrating a method for propagating proprietary information using forward tunneling in a direction from the CN toward the RAN;
  • FIG. 3 depicts the communication network of FIG. 1 illustrating a method for propagating proprietary information using reverse tunneling in a direction from the RAN toward the CN; and
  • FIG. 4 depicts a high-level block diagram of a general-purpose computer suitable for use in performing the functions described herein.
  • To facilitate understanding, identical reference numerals have been used, where possible, to designate identical elements that are common to the figures.
  • DETAILED DESCRIPTION OF THE INVENTION
  • The proprietary information signaling functions depicted and described herein enable proprietary information to be conveyed between nodes of a core network (CN) that is serving a radio access network (RAN) in a wireless communication network. The proprietary information signaling functions depicted and described herein enable proprietary information to be conveyed from the CN to the RAN for use by the RAN in performing control functions within the RAN. The proprietary information signaling functions depicted and described herein enable proprietary information to be conveyed from the RAN to the CN for use by the CN in performing control functions within the CN. The proprietary information signaling functions are provided on a per-packet basis, thereby providing a per-packet, and, thus, per-flow, signaling channel between the CN and RAN.
  • FIG. 1 depicts a high-level block diagram of a wireless communication network including a core network (CN) and a radio access network (RAN). As depicted in DFIG. 1, wireless communication network 100 includes an IP network 110, a core network (CN) 120, and a radio access network (RAN) 130. The IP network 110 facilitates communications for a plurality of correspondent nodes (CONs) 101. The IP network 110 communicates with CN 120. The RAN 130 facilitates communications for a plurality of mobile nodes (MNs) 199. The RAN 130 communicates with CN 120. The CN 120 facilitates communications between IP network 110 and RAN 130 and, thus, between CONs 101 and MNs 199.
  • The IP network 110 may include any IP network or combination of interconnected IP networks, such as one or more Intranets, the Internet, and the like, as well as various combinations thereof. Although represented as an IP network, IP network 110 may encompass various other types of packet networks.
  • The CN 120 is a core network. As depicted in FIG. 1, CN 120 includes a mobility anchor node 121 and a mobility gateway node 122. The mobility anchor node 121 operates as a mobility anchor. The mobility anchor node 121 operates as a gateway between CN 120 and IP network 110. The mobility gateway node 122 operates as a gateway between CN 120 and RAN 130. The CN 120 includes various other network elements adapted for providing various other functions, services, and the like (each of which is omitted for purposes of clarity).
  • The RAN 130 is a radio access network, providing an air interface for mobile nodes. The RAN 130 may include a control node and a radio access node, as well as various other nodes which may be deployed within different types of RANs (each of which is omitted for purposes of clarity).
  • The IP network 110, CN 120, and RAN 130 facilitate communications between CONs 101 and MNs 199.
  • The CONs 101 include nodes with which MNs 199 may communicate. The CONs 101 may be stationary and/or mobile. For example, CONs 101 may include phones (e.g., wired VoIP phones, wireless mobile phones, and the like), servers, and the like. For example, the CONs 101 may include Disney servers providing Disney content, CBS News servers providing CBS News content, or any other servers adapted for serving MNs 199. In other words, CONs 101 may include any nodes with which MNs 199 may communicate to exchange information.
  • The MNs 199 include wireless nodes which have wireless network connectivity via RAN 130. For example, MNs 199 may include nodes such as cell phones, personal digital assistants (PDAs), computers, and the like.
  • The examples of CONs 101 and MNs 199 provided herein are merely for illustrative purposes and, therefore, the proprietary information signaling functions depicted and described herein are not intended to be limited by such examples.
  • The wireless communication network 100 (and, therefore, CN 120 and RAN 130) may be implemented using any wireless communication network technologies. For example, the wireless communication network 100 may be implemented using one or more of a Universal Mobile Telecommunication System (UMTS)-based wireless network, a Code Division Multiple Access (CDMA)-based wireless network, a Worldwide Interoperability for Microwave Access (WiMAX)-based wireless network, and the like. The network elements deployed within CN 120 and RAN 130 vary depending on the type of wireless communication network employed.
  • In one embodiment, for example, where the wireless communication network 100 is a UMTS-based Long Term Evolution (LTE) network, mobility anchor node 121 may be implemented as a Packet Data Network (PDN)-Gateway (PDN-GW) and mobility gateway node 122 may be implemented as a Serving-Gateway (S-GW).
  • In one embodiment, for example, where the wireless communication network 100 is a CDMA2000 Evolution-Data Optimized (EV-DO) network, mobility anchor node 121 may be implemented as a Home Agent (HA) and mobility gateway node 122 may be implemented as a Packet Data Serving Node (PDSN).
  • In one embodiment, for example, where RAN 130 is a UMTS-based RAN, the control node is a Radio Network Controller (RNC) and the radio access node is a Node B. In one such embodiment, for example, where RAN 130 is an LTE-based RAN, the radio access node is an eNode-B.
  • In one embodiment, for example, where RAN 130 is a CDMA-based RAN, the control node is a Radio Network Controller (RNC) and the radio access node is a base transceiver station (BTS).
  • In one embodiment, for example, where RAN 130 is a WiMAX-based RAN, the control node is an Access Service Network-Gateway (ASN-GW) and the radio access node is a base station (BS).
  • Although primarily depicted and described with respect to specific types of wireless communications networks, the proprietary information signaling functions depicted and described herein may be utilized in various other types of wireless communications networks.
  • The CN 120 supports propagation of proprietary information within CN 120.
  • The CN 120 supports propagation of proprietary information within CN 120 from the mobility anchor node 121 to the mobility gateway node 122. The mobility gateway node 122 may then signal the proprietary information to RAN 130 for use by one or more nodes of the RAN 130 in performing one or more control functions within RAN 130.
  • The CN 120 supports propagation of proprietary information within CN 120 from the mobility gateway node 122 to the mobility anchor node 121. The CN 120 may then use the proprietary information in performing one or more control functions within CN 120.
  • The propagation of proprietary information within CN 120 for a given IP packet is performed by tunneling IP packets within CN 120 using Mobile IPv4 (MIPv4) tunneling. An IP packet that is tunneled using MIPv4 tunneling includes a payload, an inner IP packet header, and an outer IP packet header. The inner IP packet header propagates the proprietary information using one or more IPv4 Options fields which are added to the inner IP packet header at the source node endpoint of the MIPv4 tunnel and removed from the inner IP packet header at the destination node endpoint of the MIPv4 tunnel. The inner IP packet header and payload form a payload for an outer IP packet header. The outer IP packet header is used to route the IP packet between the endpoints of the MIPv4 tunnel, such that the inner IP packet header remains transparent to all of the intermediate nodes between the endpoints of the MIPv4 tunnel.
  • As described herein, proprietary information is propagated within CN 120 using one or more IPv4 Options fields. In general, an IP packet may include zero or more IPv4 Options fields, which makes the total length of the IPv4 Options field in an IP packet header of the IP packet variable. The IPv4 Options field(s) which may be included within the header of an IP packet is standardized in RFC 791, which is incorporated herein by reference in its entirety. The IPv4 Options field(s) is typically used to support functions such as source routing, trace route recording, router time stamping, and military security classification and, thus, cannot be used for other signaling purposes. In the proprietary information signaling scheme depicted and described herein, however, forward tunneling (i.e., from mobility anchor node 121 to mobility gateway node 122 in the direction toward the RAN 130) and reverse tunneling (i.e., from the mobility gateway node 122 to the mobility anchor node 121 in the direction from the RAN 130) both use an outer IP packet header which is pre-pended to each IP packet being tunneled, thereby rendering the inner IP packet header of each IP packet (which is essentially transported as part of the payload within the tunnel) transparent to intermediate nodes of the tunnel. As such, for forward tunneling the mobility anchor node 121 may add one or more IPv4 Options fields to the inner IP packet header in order to communicate proprietary information with the CN 120 for delivery to the RAN 130; and for reverse tunneling the mobility gateway node 122 may add one or more IPv4 Options fields to the inner IP packet header in order to communicate proprietary information, received from the RAN 130, to one or more nodes within the CN 120.
  • As described herein, wireless communication network 100 supports forward communication paths from CONs 101 toward MNs 199 and supports reverse communication paths from MNs 199 toward CONs 101. The forward communication paths utilize forward tunneling in the CN 120 (i.e., tunneling from mobility anchor node 121 to mobility gateway node 122) for propagating proprietary information from CN 120 toward RAN 120, which may be better understood with respect to FIG. 2. The reverse communication paths utilize reverse tunneling in the CN 120 (i.e., tunneling from mobility gateway node 122 to mobility anchor node 121) for propagating proprietary information from RAN 130 within CN 120, which may be better understood with respect to FIG. 3.
  • FIG. 2 depicts the communication network of FIG. 1 illustrating a method for propagating proprietary information using forward tunneling in a direction from the CN 120 toward the RAN 130.
  • The mobility anchor node 121 receives an IP packet (which may also be referred to as an original IP packet). The mobility anchor node 121 receives the IP packet from the IP network 110 (e.g., where the IP packet is part of a packet flow from one of the CONs 101 toward one or more of the MNs 199). The received IP packet includes a payload and a header (which is referred to herein as an inner header).
  • The mobility anchor node 121 encodes proprietary information in one or more IPv4 Options fields which are added to the inner header of the IP packet received at the mobility anchor node 121 to form a modified IP packet.
  • The proprietary information may include any information which may be used for performing control functions within RAN 130.
  • In one embodiment, for example, proprietary information associated with an IP packet of an IP flow may specify information such as the type of application of the IP flow (e.g., e-mail, voice over IP, streaming video, and the like), the specific application of the IP flow (e.g., YouTube, Skype, Slingbox, and the like), the content provider that is the source of the content being conveyed by the IP flow (e.g., Disney, MSNBC, CNN, and the like), and the like, as well as various combinations thereof.
  • In one embodiment, for example, proprietary information associated with an IP packet of an IP flow may specify one or more policies to be applied to the IP packet within the RAN 130. In one such embodiment, the policy(s) to be applied to the IP packet within RAN 130 may be determined using such higher-layer information (e.g., the type of application of the IP flow, specific application of the IP flow, content provider that is the source of the content being conveyed by the IP flow, and the like, as well as various combinations thereof).
  • The proprietary information may include any other information which may be used for performing control functions within RAN 130.
  • The proprietary information may be determined by the mobility anchor node 121 by performing deep packet inspection on the payload of the received IP packet. The proprietary information may be received at mobility anchor node 121 from one or more other nodes of CN 120 (not depicted). The proprietary information may be determined, received, or otherwise obtained in various other ways. The proprietary information may be encoded within the one or more IPv4 Options fields in any manner for encoding such information.
  • The mobility anchor node 121 prepends an outer header to the modified IP packet such that the inner header and payload of the modified IP packet together form a payload for the outer header. The outer header identifies mobility anchor node 121 as the source node of the IP packet and mobility gateway node 122 as the destination node of the IP packet. The IP packet including the original payload, the inner header, and the outer header is tunneled from the mobility anchor node 121 to the mobility gateway node 122 (and, thus, is referred to as a tunneled IP packet).
  • The mobility anchor node 121 propagates the tunneled IP packet to the mobility gateway node 122. The tunneled IP packet is tunneled from mobility anchor node 121 to mobility gateway node 122 using the information in the outer header of the tunneled IP packet. In this manner, the proprietary information is tunneled from mobility anchor node 121 to mobility gateway node 122 without the proprietary information being processed by any intermediate nodes along the path between mobility anchor node 121 and mobility gateway node 122.
  • The mobility gateway node 122 receives the tunneled IP packet from mobility anchor node 121. The mobility gateway node 122 removes the outer header from the tunneled IP packet. The mobility gateway node 122 strips any IPv4 Options fields from the inner header of the IP packet, thereby returning the modified IP packet to its original form (i.e., to the format of the IP packet originally received by mobility anchor node 121). The mobility gateway node 122 recovers the proprietary information from the stripped IPv4 Options field(s).
  • The mobility gateway node 122 propagates the original IP packet to the RAN 130 for delivery to its intended destination (e.g., one of the MNs 199) via RAN 130. The mobility gateway node 122 may propagate the original IP packet to RAN 130 in any manner for propagating IP packets from CN 120 to RAN 130.
  • The mobility gateway node 122 propagates the proprietary information toward RAN 130. The mobility gateway node 122 may propagate proprietary information toward RAN 130 in any manner for propagating such information from CN 120 to RAN 130. In one embodiment, for example, the proprietary information may be propagated to RAN 130 using one or more existing RAN protocols.
  • The RAN 130 receives the proprietary information. The RAN 130 uses the proprietary information to perform one or more control functions within the RAN 130. For example, the control function(s) which may be performed within the RAN 130 using proprietary information includes one or more of performing a network management operation, performing a quality-of-service control operation, performing a congestion control operation (e.g., applying flow control, applying overload control, and the like), and the like, as well as various combinations thereof.
  • As an example, upon receiving the proprietary information, RAN 130 may determine that IP packets of the IP flow are associated with a preferred application (e.g., CNN) and, thus, are to be given priority within RAN 130 over other packets of other IP flows not associated with preferred applications.
  • As another example, upon receiving the proprietary information, RAN 130 may determine that IP packets of the IP flow are associated with a type of application requiring a certain air-interface bandwidth) in order to maintain an acceptable level of quality-of-service (e.g., a streaming video application) and, thus, are to be given priority over other IP flows conveying content for other types of applications.
  • FIG. 3 depicts the communication network of FIG. 1 illustrating a method for propagating proprietary information using reverse tunneling in a direction from the RAN 130 toward the CN 120.
  • The mobility gateway node 122 receives an IP packet (which may also be referred to as an original IP packet). The mobility gateway node 122 receives the IP packet from the RAN 130 (e.g., where the IP packet is part of a packet flow from one of the MNs 199 toward one of the CONs 101). The received IP packet includes a payload and a header (which is referred to herein as an inner header).
  • The mobility gateway node 122 encodes proprietary information in one or more IPv4 Options fields which are added to the inner header of the IP packet received at the mobility gateway node 122 to form a modified IP packet.
  • The proprietary information may include any information which may be used for performing control functions within CN 120. For example, the proprietary information may specify information such as RAN congestion status. This status may be used by the CN to control the flow of data from the CN 120 to the RAN 130. For example, the proprietary information may be used to specify flow admission control information to be used by the CN 120 to determine whether a new flow may be admitted to the network. For example, the proprietary information may be used to provide RAN capability information to the CN 120 to ensure compatibility between CN and RAN functions. The proprietary information may be used within CN 120 in various other ways.
  • The proprietary information may be determined by the mobility gateway node 122 by performing deep packet inspection on the payload of the received IP packet. The proprietary information may be received at mobility gateway node 122 from one or more other nodes of CN 120 and/or RAN 130 (not depicted). The proprietary information may be determined, received, or otherwise obtained in various other ways. The proprietary information may be encoded within the one or more IPv4 Options fields in any manner for encoding such information.
  • The mobility gateway node 122 prepends an outer header to the modified IP packet such that the inner header and payload of the modified IP packet together form a payload for the outer header. The outer header identifies mobility gateway node 122 as the source node of the IP packet and mobility anchor node 121 as the destination node of the IP packet. The IP packet including the original payload, the inner header, and the outer header is tunneled from the mobility gateway node 122 to the mobility anchor node 121 (and, thus, is referred to as a tunneled IP packet).
  • The mobility gateway node 122 propagates the tunneled IP packet to the mobility anchor node 121. The tunneled IP packet is tunneled from the mobility gateway node 122 to the mobility anchor node 121 using the information in the outer header of the tunneled IP packet. In this manner, the proprietary information is tunneled from mobility gateway node 122 to mobility anchor node 121 without the proprietary information being processed by any intermediate nodes along the path between mobility gateway node 122 and mobility anchor node 121.
  • The mobility anchor node 121 receives the tunneled IP packet from mobility gateway node 122. The mobility anchor node 121 removes the outer header from the tunneled IP packet. The mobility anchor node 121 strips any IPv4 Options fields from the inner header of the IP packet, thereby returning the modified IP packet to its original form (i.e., to the format of the IP packet originally received by mobility gateway node 122). The mobility anchor node 121 recovers the proprietary information from the stripped IPv4 Options field(s).
  • The mobility anchor node 121 propagates the original IP packet toward its intended destination (e.g., one of the CONs 101) via IP network 110. The mobility anchor node 121 may propagate the original IP packet toward its intended destination in any manner for propagating IP packets within a packet network.
  • The mobility anchor node 121 may utilize the proprietary information to perform one or more control functions and/or may propagate the proprietary information toward one or more other nodes inside and/or outside of CN 120 for use in performing one or more control functions. The mobility anchor node 121 may propagate the proprietary information within or outside of CN 120 in any manner adapted for propagating such information.
  • The CN 120 uses the proprietary information to perform one or more control functions within the CN 120. For example, the control function(s) which may be performed within the CN 120 using proprietary information includes one or more of performing a network management operation, performing a quality-of-service control operation, performing a congestion control operation (e.g., applying flow control, applying overload control, and like congestion control operations), determining compatibility between CN and RAN functions using RAN capability information signaled into the CN from the RAN, and the like, as well as various combinations thereof.
  • Although primarily depicted and described herein with respect to IP packets, the proprietary information signaling functions depicted and described herein may be utilized for propagating proprietary information between the CN and RAN in networks that convey information using other types of packets. In such embodiments, proprietary information may be conveyed in the packets in any manner supported by the type of packet within which proprietary information is to be conveyed.
  • FIG. 4 depicts a high-level block diagram of a general-purpose computer suitable for use in performing the functions described herein. As depicted in FIG. 4, system 400 comprises a processor element 402 (e.g., a CPU), a memory 404, e.g., random access memory (RAM) and/or read only memory (ROM), a proprietary information signaling control module 405, and various input/output devices 406 (e.g., storage devices, including but not limited to, a tape drive, a floppy drive, a hard disk drive or a compact disk drive, a receiver, a transmitter, a speaker, a display, an output port, and a user input device (such as a keyboard, a keypad, a mouse, and the like)).
  • It should be noted that the present invention may be implemented in software and/or in a combination of software and hardware, e.g., using application specific integrated circuits (ASIC), a general purpose computer or any other hardware equivalents. In one embodiment, a proprietary information signaling control process 405 can be loaded into memory 404 and executed by processor 402 to implement the functions as discussed above. As such, proprietary information signaling control process 405 (including associated data structures) of the present invention can be stored on a computer readable medium or carrier, e.g., RAM memory, magnetic or optical drive or diskette, and the like.
  • It is contemplated that some of the steps discussed herein as software methods may be implemented within hardware, for example, as circuitry that cooperates with the processor to perform various method steps. Portions of the functions/elements described herein may be implemented as a computer program product wherein computer instructions, when processed by a computer, adapt the operation of the computer such that the methods and/or techniques described herein are invoked or otherwise provided. Instructions for invoking the inventive methods may be stored in fixed or removable media, transmitted via a data stream in a broadcast or other signal bearing medium, and/or stored within a memory within a computing device operating according to the instructions.
  • Although various embodiments which incorporate the teachings of the present invention have been shown and described in detail herein, those skilled in the art can readily devise many other varied embodiments that still incorporate these teachings.

Claims (24)

1. A method for signaling proprietary information within a core network (CN) of a wireless communication network, comprising:
encoding the proprietary information in an IPv4 Options field of an inner header of an IP packet; and
pre-pending an outer header to the IP packet for Mobile IPv4 (MIPv4) tunneling of the IP packet from a mobility anchor node of the CN toward a mobility gateway node of the CN.
2. The method of claim 1, wherein the proprietary information is determined by the mobility anchor node using deep packet inspection.
3. The method of claim 1, wherein the proprietary information is received at the mobility anchor node of the CN from at least one other node of the CN.
4. The method of claim 1, wherein the proprietary information is adapted for use by a radio access network (RAN) in performing at least one control function within the RAN.
5. The method of claim 4, wherein performing the at least one control function comprises at least one of performing a network management operation, performing a quality-of-service control operation, and performing a congestion control operation.
6. The method of claim 1, wherein:
if the wireless communication network is a CDMA-based network, the mobility anchor node is a home agent (HA) and the mobility gateway node is a packet data serving node (PDSN) operating as a gateway from the CN to a radio access network (RAN); or
if the wireless communication network is a LTE-based RAN, the mobility anchor node is a PDN gateway (P-GW) and the mobility gateway node is a serving gateway (S-GW) operating as a gateway from the CN to a radio access network (RAN).
7. A method for signaling proprietary information within a wireless communication network having a core network (CN) and a radio access network (RAN), comprising:
receiving an IP packet at a mobility gateway node operating as a gateway from the CN to the RAN, wherein the IP packet comprises an outer header, an inner header, and a payload;
removing the outer header from the IP packet;
stripping an IPv4 Options field from the inner header of the IP packet, wherein the IPv4 Options field includes the proprietary information; and
propagating the proprietary information from the mobility gateway node toward the RAN.
8. The method of claim 7, wherein the proprietary information is adapted for use by the RAN in performing at least one control function within the RAN.
9. The method of claim 8, wherein performing the at least one control function comprises at least one of performing a network management operation, performing a quality-of-service control operation, and performing a congestion control operation.
10. The method of claim 7, wherein the proprietary information is propagated from the mobility gateway node toward the RAN using at least one RAN signaling protocol.
11. The method of claim 7, wherein the proprietary information is propagated from the mobility gateway node toward a control node of the RAN, wherein:
if the RAN is a CDMA-based RAN, the control node is a Radio Network Controller (RNC); or
if the RAN is a UMTS-based RAN, the control node is a Radio Network Controller (RNC); or
if the RAN is a WiMAX-based RAN, the control node is an Access Service Network-Gateway (ASN-GW); or
if the RAN is a LTE-based RAN, the control node is an eNode-B.
12. The method of claim 7, wherein the IP packet is received at the mobility gateway node of the CN from a mobility anchor node of the CN using Mobile IP version 4 (MIPv4) tunneling.
13. The method of claim 12, wherein:
if the wireless communication network is a CDMA-based network, the mobility anchor node is a home agent (HA) and the mobility gateway node is a packet data serving node (PDSN) operating as a gateway from the CN to a radio access network (RAN); or
if the wireless communication network is a LTE-based RAN, the mobility anchor node is a PDN gateway (P-GW) and the mobility gateway node is a serving gateway (S-GW) operating as a gateway from the CN to a radio access network (RAN).
14. The method of claim 7, further comprising:
forwarding the modified IP packet, with the outer header and the IPv4 Options field removed, toward the RAN.
15. A method for signaling proprietary information within a core network (CN) of a wireless communication network, comprising:
encoding the proprietary information in an IPv4 Options field of an inner header of an IP packet; and
pre-pending an outer header to the IP packet for Mobile IPv4 (MIPv4) tunneling of the IP packet from a mobility gateway node of the CN toward a mobility anchor node of the CN.
16. The method of claim 15, wherein the proprietary information is determined by the mobility gateway node using deep packet inspection.
17. The method of claim 15, wherein the proprietary information is received at the mobility gateway node of the CN from a node of a radio access network (RAN) in communication with the CN.
18. The method of claim 15, wherein the proprietary information is adapted for use by the CN in performing at least one control function within the CN.
19. The method of claim 18, wherein performing the at least one control function comprises at least one of performing a network management operation, performing a quality-of-service control operation, and performing a congestion control operation.
20. The method of claim 15, wherein:
if the wireless communication network is a CDMA-based network, the mobility gateway node is a packet data serving node (PDSN) operating as a gateway to the CN from a radio access network (RAN) and the mobility anchor node is a home agent (HA); or
if the wireless communication network is a LTE-based RAN, the mobility gateway node is a serving gateway (S-GW) operating as a gateway to the CN from a radio access network (RAN) and the mobility anchor node is a PDN gateway (P-GW).
21. A method for signaling proprietary information within a wireless communication network having a core network (CN) and a radio access network (RAN), comprising:
receiving an IP packet at a mobility anchor node of the CN, wherein the IP packet comprises an outer header, an inner header, and a payload;
removing the outer header from the IP packet;
stripping an IPv4 Options field from the inner header of the IP packet, wherein the IPv4 Options field includes the proprietary information; and
performing at least one of:
performing a control function within the CN using the proprietary information; and
propagating the proprietary information toward at least one other node of the CN.
22. The method of claim 21, wherein performing the control function comprises at least one of performing a network management operation, performing a quality-of-service control operation, and performing a congestion control operation.
23. The method of claim 21, wherein the IP packet is received at the mobility anchor node of the CN from a mobility gateway node of the CN using Mobile IP version 4 (MIPv4) tunneling.
24. The method of claim 23, wherein:
if the wireless communication network is a CDMA-based network, the mobility anchor node is a home agent (HA) and the mobility gateway node is a packet data serving node (PDSN) operating as a gateway from the CN to a radio access network (RAN); or
if the wireless communication network is a LTE-based RAN, the mobility anchor node is a PDN gateway (P-GW) and the mobility gateway node is a serving gateway (S-GW) operating as a gateway from the CN to a radio access network (RAN).
US12/241,244 2008-09-30 2008-09-30 Method and apparatus for signaling proprietary information between network elements of a core network in a wireless communication network Expired - Fee Related US8503432B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/241,244 US8503432B2 (en) 2008-09-30 2008-09-30 Method and apparatus for signaling proprietary information between network elements of a core network in a wireless communication network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/241,244 US8503432B2 (en) 2008-09-30 2008-09-30 Method and apparatus for signaling proprietary information between network elements of a core network in a wireless communication network

Publications (2)

Publication Number Publication Date
US20100080123A1 true US20100080123A1 (en) 2010-04-01
US8503432B2 US8503432B2 (en) 2013-08-06

Family

ID=42057369

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/241,244 Expired - Fee Related US8503432B2 (en) 2008-09-30 2008-09-30 Method and apparatus for signaling proprietary information between network elements of a core network in a wireless communication network

Country Status (1)

Country Link
US (1) US8503432B2 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090285099A1 (en) * 2008-05-16 2009-11-19 Colin Kahn Method and apparatus for providing congestion control in radio access networks
US20090296613A1 (en) * 2008-06-03 2009-12-03 Colin Kahn Method and apparatus for providing quality-of-service in radio access networks
US20100080153A1 (en) * 2008-09-30 2010-04-01 Colin Kahn Method and apparatus for prioritizing packets for use in managing packets in radio access networks
US20130097418A1 (en) * 2011-10-17 2013-04-18 Yogesh Bhatt Methods and apparatuses to provide secure communication between an untrusted wireless access network and a trusted controlled network
US20130336486A1 (en) * 2012-06-13 2013-12-19 Samsung Electronics Co., Ltd. Method and system for securing control packets and data packets in a mobile broadband network environment
CN104010615A (en) * 2011-12-29 2014-08-27 株式会社大塚制药工场 Exposure prevention cover, exposure prevention cover module provided with same, drug solution supply system, and drug solution supply method
US9729431B1 (en) * 2011-08-16 2017-08-08 Marvell International Ltd. Using standard fields to carry meta-information

Citations (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030039246A1 (en) * 2001-08-22 2003-02-27 Yile Guo IP/MPLS-based transport scheme in 3G radio access networks
US6538989B1 (en) * 1997-09-09 2003-03-25 British Telecommunications Public Limited Company Packet network
US6631122B1 (en) * 1999-06-11 2003-10-07 Nortel Networks Limited Method and system for wireless QOS agent for all-IP network
US20030235171A1 (en) * 2002-06-24 2003-12-25 Anders Lundstrom Applications based radio resource management in a wireless communication network
US20040111541A1 (en) * 2001-04-09 2004-06-10 Michael Meyer Method of controlling a queue buffer
US20040141462A1 (en) * 2003-01-17 2004-07-22 Nortel Networks Limited Multi-staged services policing
US20040148425A1 (en) * 2001-06-29 2004-07-29 Serge Haumont Method for transmitting application packet data
US6788646B1 (en) * 1999-10-14 2004-09-07 Telefonaktiebolaget Lm Ericsson (Publ) Link capacity sharing for throughput-blocking optimality
US20040218617A1 (en) * 2001-05-31 2004-11-04 Mats Sagfors Congestion and delay handling in a packet data network
US20050094618A1 (en) * 2003-11-05 2005-05-05 Erik Colban Method of synchronizing broadcast streams in multiple soft handoff sectors
US20050111462A1 (en) * 2003-11-26 2005-05-26 J. Rodney Walton Quality of service scheduler for a wireless network
US20050237969A1 (en) * 2004-04-24 2005-10-27 Samsung Electronics Co., Ltd. Apparatus and method for producing a tunnel in an integrated serving general packet radio service (GPRS) service node (SGSN) and gateway GPRS support node (GGSN) in a universal mobile telecommunication service (UMTS) network
US20050249114A1 (en) * 2004-01-30 2005-11-10 Mitsubishi Denki Kabushiki Kaisha Method and device of dynamic resource allocation in a wireless network
US20050265363A1 (en) * 2002-09-24 2005-12-01 Xiaobao Chen Methods and apparatus for data transfer in a packet-switched data network
US20060098645A1 (en) * 2004-11-09 2006-05-11 Lev Walkin System and method for providing client identifying information to a server
US20060126509A1 (en) * 2004-12-09 2006-06-15 Firas Abi-Nassif Traffic management in a wireless data network
US20060239188A1 (en) * 2005-04-20 2006-10-26 Walter Weiss Providing a quality of service for various classes of service for transfer of electronic data packets
US20060268908A1 (en) * 2002-05-13 2006-11-30 Kiyon, Inc. Scalable media access control for multi-hop high bandwidth communications
US20060268689A1 (en) * 2005-05-26 2006-11-30 Ahmed Tarraf Backhaul congestion control for wireless communication networks
US20070153695A1 (en) * 2005-12-29 2007-07-05 Ralph Gholmieh Method and apparatus for communication network congestion control
US20070195788A1 (en) * 2006-02-17 2007-08-23 Vasamsetti Satya N Policy based procedure to modify or change granted QoS in real time for CDMA wireless networks
US20070207818A1 (en) * 2006-03-06 2007-09-06 Rosenberg Jonathan D System and method for exchanging policy information in a roaming communications environment
US20080005572A1 (en) * 2002-04-17 2008-01-03 Moskowitz Scott A Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
US20080089237A1 (en) * 2006-10-11 2008-04-17 Ibahn Corporation System and method for dynamic network traffic prioritization
US20080137536A1 (en) * 2005-03-29 2008-06-12 Patrice Hede Method for Managing Network Node Overload and System Thereof
US20080192711A1 (en) * 2007-02-14 2008-08-14 Krishna Balachandran Proxy-based signaling architecture for streaming media services in a wireless communication system
US20090083144A1 (en) * 2007-09-26 2009-03-26 Menditto Louis F Controlling receipt of electronic advertising
US20090225655A1 (en) * 2008-03-07 2009-09-10 Embarq Holdings Company, Llc System, Method, and Apparatus for Prioritizing Network Traffic Using Deep Packet Inspection (DPI)
US20090252148A1 (en) * 2008-04-03 2009-10-08 Alcatel Lucent Use of DPI to extract and forward application characteristics
US20090285099A1 (en) * 2008-05-16 2009-11-19 Colin Kahn Method and apparatus for providing congestion control in radio access networks
US20090300153A1 (en) * 2008-05-29 2009-12-03 Embarq Holdings Company, Llc Method, System and Apparatus for Identifying User Datagram Protocol Packets Using Deep Packet Inspection
US20090296613A1 (en) * 2008-06-03 2009-12-03 Colin Kahn Method and apparatus for providing quality-of-service in radio access networks
US20100080153A1 (en) * 2008-09-30 2010-04-01 Colin Kahn Method and apparatus for prioritizing packets for use in managing packets in radio access networks

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3618073B2 (en) 2000-05-11 2005-02-09 三菱電機株式会社 Wireless band priority allocation device
FI113926B (en) 2001-08-16 2004-06-30 Teliasonera Finland Oyj Monitoring and transmitting the QOS value over a telecommunications network
US7668141B2 (en) 2004-07-06 2010-02-23 Motorola, Inc. Method and apparatus for managing packet data loss in a wireless network
ATE378789T1 (en) 2004-12-15 2007-11-15 Matsushita Electric Ind Co Ltd SUPPORT FOR GUARANTEED BIT RATE TRAFFIC FOR UPLINK TRANSFERS
US7760646B2 (en) 2005-02-09 2010-07-20 Nokia Corporation Congestion notification in 3G radio access
DE102005035237A1 (en) 2005-07-25 2007-03-01 T-Mobile International Ag & Co. Kg Method for controlling resources in network elements of a telecommunications network

Patent Citations (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6538989B1 (en) * 1997-09-09 2003-03-25 British Telecommunications Public Limited Company Packet network
US6631122B1 (en) * 1999-06-11 2003-10-07 Nortel Networks Limited Method and system for wireless QOS agent for all-IP network
US6788646B1 (en) * 1999-10-14 2004-09-07 Telefonaktiebolaget Lm Ericsson (Publ) Link capacity sharing for throughput-blocking optimality
US20040111541A1 (en) * 2001-04-09 2004-06-10 Michael Meyer Method of controlling a queue buffer
US20040218617A1 (en) * 2001-05-31 2004-11-04 Mats Sagfors Congestion and delay handling in a packet data network
US20040148425A1 (en) * 2001-06-29 2004-07-29 Serge Haumont Method for transmitting application packet data
US20030039246A1 (en) * 2001-08-22 2003-02-27 Yile Guo IP/MPLS-based transport scheme in 3G radio access networks
US20080005572A1 (en) * 2002-04-17 2008-01-03 Moskowitz Scott A Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
US20060268908A1 (en) * 2002-05-13 2006-11-30 Kiyon, Inc. Scalable media access control for multi-hop high bandwidth communications
US20030235171A1 (en) * 2002-06-24 2003-12-25 Anders Lundstrom Applications based radio resource management in a wireless communication network
US20050265363A1 (en) * 2002-09-24 2005-12-01 Xiaobao Chen Methods and apparatus for data transfer in a packet-switched data network
US20040141462A1 (en) * 2003-01-17 2004-07-22 Nortel Networks Limited Multi-staged services policing
US20050094618A1 (en) * 2003-11-05 2005-05-05 Erik Colban Method of synchronizing broadcast streams in multiple soft handoff sectors
US20050111462A1 (en) * 2003-11-26 2005-05-26 J. Rodney Walton Quality of service scheduler for a wireless network
US20050249114A1 (en) * 2004-01-30 2005-11-10 Mitsubishi Denki Kabushiki Kaisha Method and device of dynamic resource allocation in a wireless network
US20050237969A1 (en) * 2004-04-24 2005-10-27 Samsung Electronics Co., Ltd. Apparatus and method for producing a tunnel in an integrated serving general packet radio service (GPRS) service node (SGSN) and gateway GPRS support node (GGSN) in a universal mobile telecommunication service (UMTS) network
US20060098645A1 (en) * 2004-11-09 2006-05-11 Lev Walkin System and method for providing client identifying information to a server
US20060126509A1 (en) * 2004-12-09 2006-06-15 Firas Abi-Nassif Traffic management in a wireless data network
US20080137536A1 (en) * 2005-03-29 2008-06-12 Patrice Hede Method for Managing Network Node Overload and System Thereof
US20060239188A1 (en) * 2005-04-20 2006-10-26 Walter Weiss Providing a quality of service for various classes of service for transfer of electronic data packets
US20060268689A1 (en) * 2005-05-26 2006-11-30 Ahmed Tarraf Backhaul congestion control for wireless communication networks
US20070153695A1 (en) * 2005-12-29 2007-07-05 Ralph Gholmieh Method and apparatus for communication network congestion control
US20070195788A1 (en) * 2006-02-17 2007-08-23 Vasamsetti Satya N Policy based procedure to modify or change granted QoS in real time for CDMA wireless networks
US20070207818A1 (en) * 2006-03-06 2007-09-06 Rosenberg Jonathan D System and method for exchanging policy information in a roaming communications environment
US20080089237A1 (en) * 2006-10-11 2008-04-17 Ibahn Corporation System and method for dynamic network traffic prioritization
US20080192711A1 (en) * 2007-02-14 2008-08-14 Krishna Balachandran Proxy-based signaling architecture for streaming media services in a wireless communication system
US20090083144A1 (en) * 2007-09-26 2009-03-26 Menditto Louis F Controlling receipt of electronic advertising
US20090225655A1 (en) * 2008-03-07 2009-09-10 Embarq Holdings Company, Llc System, Method, and Apparatus for Prioritizing Network Traffic Using Deep Packet Inspection (DPI)
US20090252148A1 (en) * 2008-04-03 2009-10-08 Alcatel Lucent Use of DPI to extract and forward application characteristics
US20090285099A1 (en) * 2008-05-16 2009-11-19 Colin Kahn Method and apparatus for providing congestion control in radio access networks
US20090300153A1 (en) * 2008-05-29 2009-12-03 Embarq Holdings Company, Llc Method, System and Apparatus for Identifying User Datagram Protocol Packets Using Deep Packet Inspection
US20090296613A1 (en) * 2008-06-03 2009-12-03 Colin Kahn Method and apparatus for providing quality-of-service in radio access networks
US20100080153A1 (en) * 2008-09-30 2010-04-01 Colin Kahn Method and apparatus for prioritizing packets for use in managing packets in radio access networks

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090285099A1 (en) * 2008-05-16 2009-11-19 Colin Kahn Method and apparatus for providing congestion control in radio access networks
US8553554B2 (en) 2008-05-16 2013-10-08 Alcatel Lucent Method and apparatus for providing congestion control in radio access networks
US20090296613A1 (en) * 2008-06-03 2009-12-03 Colin Kahn Method and apparatus for providing quality-of-service in radio access networks
US20100080153A1 (en) * 2008-09-30 2010-04-01 Colin Kahn Method and apparatus for prioritizing packets for use in managing packets in radio access networks
US8027255B2 (en) 2008-09-30 2011-09-27 Alcatel Lucent Method and apparatus for prioritizing packets for use in managing packets in radio access networks
US9729431B1 (en) * 2011-08-16 2017-08-08 Marvell International Ltd. Using standard fields to carry meta-information
US20130097418A1 (en) * 2011-10-17 2013-04-18 Yogesh Bhatt Methods and apparatuses to provide secure communication between an untrusted wireless access network and a trusted controlled network
US9521145B2 (en) * 2011-10-17 2016-12-13 Mitel Mobility Inc. Methods and apparatuses to provide secure communication between an untrusted wireless access network and a trusted controlled network
CN104010615A (en) * 2011-12-29 2014-08-27 株式会社大塚制药工场 Exposure prevention cover, exposure prevention cover module provided with same, drug solution supply system, and drug solution supply method
TWI606820B (en) * 2011-12-29 2017-12-01 大塚製藥工場股份有限公司 Exposure prevention cover, exposure prevention cover module with the same, liquid supply system, and liquid supply method
US20130336486A1 (en) * 2012-06-13 2013-12-19 Samsung Electronics Co., Ltd. Method and system for securing control packets and data packets in a mobile broadband network environment
US9801052B2 (en) * 2012-06-13 2017-10-24 Samsung Electronics Co., Ltd. Method and system for securing control packets and data packets in a mobile broadband network environment

Also Published As

Publication number Publication date
US8503432B2 (en) 2013-08-06

Similar Documents

Publication Publication Date Title
US8503432B2 (en) Method and apparatus for signaling proprietary information between network elements of a core network in a wireless communication network
US20090296613A1 (en) Method and apparatus for providing quality-of-service in radio access networks
JP4790800B2 (en) Method and apparatus for controlling transmission rate of voice service in mobile communication system supporting voice service via packet network
US10187311B2 (en) Selectively transferring high-priority non-audio data over a quality of service channel
US9350662B2 (en) Server mediated peer-to-peer communication offloading from network infrastructure
JP5384645B2 (en) System and method for serving gateway with mobile packet protocol application aware packet management
US9357359B2 (en) Dynamic quality of service (QoS) for services over cellular
US20150195326A1 (en) Detecting whether header compression is being used for a first stream based upon a delay disparity between the first stream and a second stream
US20140211619A1 (en) Probabilistic retention of the quality of service (qos) bearer for voice over internet protocol (voip) service as voice over long term evolution (volte)
KR20100116681A (en) In-band dpi application awareness propagation enhancements
US8619770B2 (en) Length indicator optimization
US9642109B2 (en) Single network registration where multiple applications access the network using separate processors
US9231874B2 (en) Method and network node for handling TCP traffic
KR20180037199A (en) Show deep packet inspection for mobile CDN
KR20140125149A (en) Apparatus of data offloading and method thereof
EP2941840A1 (en) Selectively patching erasures in circiut-switched calls whose frame erasure rate rises above a threshold by establishing and synchronizing a voip stream
EP1446904B1 (en) Radio bearer service for ims services
WO2017177356A1 (en) Data transmission method, base station and user equipment
Chaari et al. Multimedia quality transmission evaluation over wireless networks: a survey
US7911945B2 (en) Apparatus and method for efficiently supporting VoIP in a wireless communication system
US10841214B2 (en) Reusing a tag

Legal Events

Date Code Title Description
AS Assignment

Owner name: LUCENT TECHNOLOGIES INC.,NEW JERSEY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KAHN, COLIN;LAMOUREUX, PHILIP;REEL/FRAME:021723/0462

Effective date: 20081001

Owner name: LUCENT TECHNOLOGIES INC., NEW JERSEY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KAHN, COLIN;LAMOUREUX, PHILIP;REEL/FRAME:021723/0462

Effective date: 20081001

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: CREDIT SUISSE AG, NEW YORK

Free format text: SECURITY INTEREST;ASSIGNOR:ALCATEL-LUCENT USA INC.;REEL/FRAME:030510/0627

Effective date: 20130130

AS Assignment

Owner name: ALCATEL-LUCENT USA INC., NEW JERSEY

Free format text: MERGER;ASSIGNOR:LUCENT TECHNOLOGIES INC.;REEL/FRAME:030359/0769

Effective date: 20081101

AS Assignment

Owner name: ALCATEL LUCENT, FRANCE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ALCATEL-LUCENT USA INC.;REEL/FRAME:030409/0401

Effective date: 20130509

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: ALCATEL-LUCENT USA INC., NEW JERSEY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG;REEL/FRAME:033949/0016

Effective date: 20140819

FPAY Fee payment

Year of fee payment: 4

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20210806